FKIE_CVE-2016-3066

Vulnerability from fkie_nvd - Published: 2017-06-06 18:29 - Updated: 2025-04-20 01:37
Summary
The spice-gtk widget allows remote authenticated users to obtain information from the host clipboard.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDA3AF6-4294-42B2-A416-CD61F3F52430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C946F8D-A076-4913-93C4-E667C84E4860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84D2D6FC-01B7-45DC-84DF-F0D14AECA07C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "01EECD0C-F096-43A4-A5F2-48A00D3168D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F16DE1BA-6F15-4924-8C67-4EBCA2A3E5E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F19283D5-330D-4499-A482-E7D57E81AD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C171035-412D-41CC-BB03-B23A461FFC0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "146E7366-B84C-4C9F-8691-C3B49D7D36CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7428867C-FB75-4FF2-AB6E-089221E0EAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B9EBF1-CFFE-49EA-9DCA-A04BCF3270EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "285DCF3A-2397-43E0-AFB9-82D521293377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A99C53A-0A52-4521-A8C2-AF2FCC48FAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.12.101:*:*:*:*:*:*:*",
              "matchCriteriaId": "00F8F64D-276F-4279-864D-FAA624070756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D6C06E0-BEB9-4D58-A497-828DAE37CD09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.13.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "58EFEE35-C450-42D3-9408-E6C32F95D3C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.13.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD7A2571-7375-488D-855A-E0800DD00E80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CB594A5-8192-4F03-8609-CA989150DADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "421DA1D4-44D9-4C40-8F6D-8FFFFCA1C96B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.15.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CCB0651-A5C0-49A7-B072-03B1178A6FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CD217C9-6F89-43A5-B885-0ACE73C70053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "57CEDB86-B1CF-487C-A22D-490BF824C039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEABE4EC-F727-44D5-B278-A557DEB848F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "31477885-C71E-4C3A-912C-6C765CEA580B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AB06903-F2FE-4F05-8FE3-B3A8B53BC10F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAAE2C22-CC49-48D6-B0AA-E09773A20422",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA802C33-8020-48C4-9C5F-DEF4313AA39E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "95443269-02B9-4618-A2D4-0D887B631653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7906244-3B98-4ECD-A512-CADFDBC7CF76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AFF47B8-E0EA-4350-8A42-1FC49FE15D78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "05241121-91CD-4BD8-BCDE-37D92980A7FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "F934DEAB-26F4-4FCD-9D46-24967E4AB8EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF07D22-8267-4972-B841-1FDD585CF62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "2823FBB2-F3C3-47F2-B838-6F9F32EC191B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3667FA9B-2C1E-4F5F-BB48-F8D641B32426",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "846EE338-C723-4DE0-AE92-AC1CA7DBCA57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "755A98B8-4EDE-4274-A3AA-5177924996F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:spice-gtk_project:spice-gtk:0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "A843A2DF-D7F1-44CB-A6CC-D69AE60C4122",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The spice-gtk widget allows remote authenticated users to obtain information from the host clipboard."
    },
    {
      "lang": "es",
      "value": "El widget spice-gtk permite a los usuarios autorizados obtener de forma remota informaci\u00f3n del portapapeles del host."
    }
  ],
  "id": "CVE-2016-3066",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-06-06T18:29:00.403",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320263"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320263"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…